General
-
Target
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec
-
Size
892KB
-
Sample
221107-tgem5afaa6
-
MD5
0e75802f0dba8d9c1a63313d6303a368
-
SHA1
b49472b0626f5601b91786e2da781cd8f78e4eec
-
SHA256
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec
-
SHA512
ebce47d0e5217b7dc0b05b83193ee4c2ec41b6dee158f818b6ce9670227e13089ee059c24c78285dc270a5e5b1c117ca39affd0d8748e1dab5c418e78e8f8e46
-
SSDEEP
24576:kZ1xuVVjfFoynPaVBUR8f+kN10EBP6M4KGiKUmJ/to6o:EQDgok30G6M4KGiKPJVo6o
Behavioral task
behavioral1
Sample
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
darkcomet
Guest16
pv-hacker.myftp.biz:1604
DC_MUTEX-PM62ME6
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
M6xNxBRjn8Dz
-
install
true
-
offline_keylogger
true
-
password
123456
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec
-
Size
892KB
-
MD5
0e75802f0dba8d9c1a63313d6303a368
-
SHA1
b49472b0626f5601b91786e2da781cd8f78e4eec
-
SHA256
425e180ff28db66bf1683d1dc00ddebbe0731ecf80e6ac0c689189fef033ccec
-
SHA512
ebce47d0e5217b7dc0b05b83193ee4c2ec41b6dee158f818b6ce9670227e13089ee059c24c78285dc270a5e5b1c117ca39affd0d8748e1dab5c418e78e8f8e46
-
SSDEEP
24576:kZ1xuVVjfFoynPaVBUR8f+kN10EBP6M4KGiKUmJ/to6o:EQDgok30G6M4KGiKPJVo6o
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-